Introduction to OSF DCE (rev. 1.0)
Introduction to OSF DCE (rev. 1.0)
Role-Based Access Control Models
Computer
Configuring role-based access control to enforce mandatory and discretionary access control policies
ACM Transactions on Information and System Security (TISSEC)
On modeling system-centric information for role engineering
Proceedings of the eighth ACM symposium on Access control models and technologies
The RRA97 Model for Role-Based Administration of Role Hierarchies
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
On permissions, inheritance and role hierarchies
Proceedings of the 10th ACM conference on Computer and communications security
A role administration system in role-based authorization infrastructures: design and implementation
Proceedings of the 2003 ACM symposium on Applied computing
Using trust and risk in role-based access control policies
Proceedings of the ninth ACM symposium on Access control models and technologies
Certificate-based access control for widely distributed resources
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Classification of Security Issues and Solutions in Cloud Environments
Proceedings of International Conference on Information Integration and Web-based Applications & Services
Hi-index | 0.00 |
In this paper we introduce a framework which facilitates policy-based decentralized authorization management in infrastructure as a service (IaaS). Specifically, our framework enables an IaaS service provider to delegate its administrative work to its business users. This allows each business user to build within the public cloud service provider a private cloud where the business user can manage its own users and resources allocated from the public cloud service provider. We discuss a security architecture based on our framework, along with a proof-of-concept implementation using an open source cloud software called Eucalyptus.